首页 > 最新文献

Ad Hoc & Sensor Wireless Networks最新文献

英文 中文
Experimental Assessment of IEEE 802.11-based V2I Communications 基于IEEE 802.11的V2I通信实验评估
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-11-22 DOI: 10.1145/3479240.3488506
Francesco Raviglione, M. Malinverno, Stefano Feraco, G. Avino, C. Casetti, C. Chiasserini, N. Amati, Joerg Widmer
Connected and automated vehicles are becoming a reality, and the necessity of assessing the performance of their technical enablers plays a pivotal role in the automotive field. Several technologies have been proposed by different standardization bodies, with the aim of enabling the connectivity between vehicles, and between vehicles and the infrastructure. Before the deployment of any technology, it is fundamental to perform a testing and validation phase, which is often performed in simulation environments. However, in order to assess the actual performance of a V2X (Vehicle-to-Everything) communication technology, field tests are of utmost importance. In this paper, we present the results of an extensive field test campaign of non-mmWave and mmWave IEEE 802.11 technologies for V2I (Vehicle-to-Infrastructure) communications, namely, IEEE 802.11p, IEEE 802.11ac, and IEEE 802.11ad. We assess the performance of each of them, in terms of connection stability, received signal level, Round Trip Time and UDP throughput, in both Line-Of-Sight and Non-Line-Of-Sight conditions. Our results show that, although not specifically designed for vehicular communications, IEEE 802.11ac and IEEE 802.11ad emerge as very promising technologies.
联网和自动驾驶汽车正在成为现实,评估其技术支持因素的性能的必要性在汽车领域发挥着关键作用。不同的标准化机构已经提出了几种技术,目的是实现车辆之间以及车辆与基础设施之间的连接。在部署任何技术之前,执行测试和验证阶段是基本的,这通常是在模拟环境中执行的。然而,为了评估V2X(车对一切)通信技术的实际性能,现场测试至关重要。在本文中,我们介绍了用于V2I(车对基础设施)通信的非毫米波和毫米波IEEE 802.11技术的广泛现场测试活动的结果,即IEEE 802.11p, IEEE 802.11ac和IEEE 802.11ad。我们评估他们每个人的性能,在连接稳定性,接收信号水平,往返时间和UDP吞吐量方面,在视线和非视线条件下。我们的研究结果表明,虽然IEEE 802.11ac和IEEE 802.11ad不是专门为车载通信设计的,但它们是非常有前途的技术。
{"title":"Experimental Assessment of IEEE 802.11-based V2I Communications","authors":"Francesco Raviglione, M. Malinverno, Stefano Feraco, G. Avino, C. Casetti, C. Chiasserini, N. Amati, Joerg Widmer","doi":"10.1145/3479240.3488506","DOIUrl":"https://doi.org/10.1145/3479240.3488506","url":null,"abstract":"Connected and automated vehicles are becoming a reality, and the necessity of assessing the performance of their technical enablers plays a pivotal role in the automotive field. Several technologies have been proposed by different standardization bodies, with the aim of enabling the connectivity between vehicles, and between vehicles and the infrastructure. Before the deployment of any technology, it is fundamental to perform a testing and validation phase, which is often performed in simulation environments. However, in order to assess the actual performance of a V2X (Vehicle-to-Everything) communication technology, field tests are of utmost importance. In this paper, we present the results of an extensive field test campaign of non-mmWave and mmWave IEEE 802.11 technologies for V2I (Vehicle-to-Infrastructure) communications, namely, IEEE 802.11p, IEEE 802.11ac, and IEEE 802.11ad. We assess the performance of each of them, in terms of connection stability, received signal level, Round Trip Time and UDP throughput, in both Line-Of-Sight and Non-Line-Of-Sight conditions. Our results show that, although not specifically designed for vehicular communications, IEEE 802.11ac and IEEE 802.11ad emerge as very promising technologies.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":"71 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81840804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Green Road Intersections by Efficient Traffic Light Scheduling Algorithm 基于高效红绿灯调度算法的绿色道路交叉口
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-11-22 DOI: 10.1145/3479240.3488508
Maram Bani Younes, A. Boukerche
Reducing the fuel consumption and gas emissions of traveling vehicles over the road networks have been intensively investigated over the road networks. Vehicles produce a high percentage of pollution to the atmosphere that encourages governments and organizations to invest and work toward reducing their emissions. The behavior of the same vehicle varies over downtown and highway scenarios in terms of efficiency and pollution parameters. This is due to the effects of the architectural design of the traversed road and the driving behavior. In this work, we propose an efficient traffic light scheduling algorithm. It considers the real-time traffic characteristics of the competing traffic flows at a signalized road intersection. This is to produce an efficient schedule that minimizes the total required fuel of vehicles and produces less emissions while passing safely through that intersection. An extensive set of experiments have been used to verify the performance of the proposed scheduling algorithm compared to other efficient traffic light scheduling algorithms.
减少道路网络上行驶车辆的燃料消耗和气体排放已经在道路网络上进行了深入的研究。汽车对大气产生的污染比例很高,这鼓励政府和组织投资并努力减少排放。就效率和污染参数而言,同一辆车在市区和高速公路上的行为是不同的。这是由于穿越道路的建筑设计和驾驶行为的影响。本文提出了一种高效的红绿灯调度算法。它考虑了信号交叉口竞争交通流的实时交通特性。这是为了产生一个有效的时间表,最大限度地减少车辆所需的燃料总量,并在安全通过十字路口的同时减少排放。一组广泛的实验已被用来验证该调度算法的性能与其他有效的交通灯调度算法。
{"title":"Green Road Intersections by Efficient Traffic Light Scheduling Algorithm","authors":"Maram Bani Younes, A. Boukerche","doi":"10.1145/3479240.3488508","DOIUrl":"https://doi.org/10.1145/3479240.3488508","url":null,"abstract":"Reducing the fuel consumption and gas emissions of traveling vehicles over the road networks have been intensively investigated over the road networks. Vehicles produce a high percentage of pollution to the atmosphere that encourages governments and organizations to invest and work toward reducing their emissions. The behavior of the same vehicle varies over downtown and highway scenarios in terms of efficiency and pollution parameters. This is due to the effects of the architectural design of the traversed road and the driving behavior. In this work, we propose an efficient traffic light scheduling algorithm. It considers the real-time traffic characteristics of the competing traffic flows at a signalized road intersection. This is to produce an efficient schedule that minimizes the total required fuel of vehicles and produces less emissions while passing safely through that intersection. An extensive set of experiments have been used to verify the performance of the proposed scheduling algorithm compared to other efficient traffic light scheduling algorithms.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":"1 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82336804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Towards a Throughput and Energy Efficient Association Strategy for Wi-Fi/LiFi Heterogeneous Networks 面向Wi-Fi/LiFi异构网络的吞吐量和能效关联策略
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-11-22 DOI: 10.1145/3479240.3488514
Esther Guérin, Thomas Begin, A. Busson, I. G. Lassous
In very dense or ultra-dense scenarios wherein Wi-Fi alone may not be enough to accommodate the needs of all stations, LiFi (Light Fidelity) access points can help alleviate the strain on the Wi-Fi by offloading some Wi-Fi traffic to LiFi. We study the issue of associating stations in a Wi-Fi/LiFi heterogeneous network composed of a Wi-Fi access point and multiples LiFi access points. We propose a conceptually simple and easy to implement solution to search and find an efficient mapping for the associations between stations and access points using analytical performance models for the individual throughput of each station and for the overall network energy consumption. Using two realistic deployments of heterogeneous networks for offices, we have evaluated the effectiveness of our solution at discovering better trade-offs than baseline strategies. Our numerical results show that significant gains can be obtained in terms of the throughput of the stations as well as overall energy consumption.
在非常密集或超密集的情况下,仅Wi-Fi可能不足以满足所有站点的需求,LiFi(光保真度)接入点可以通过将一些Wi-Fi流量卸载到LiFi来帮助减轻Wi-Fi的压力。本文研究了由一个Wi-Fi接入点和多个LiFi接入点组成的Wi-Fi/LiFi异构网络中的关联站问题。我们提出了一个概念上简单且易于实施的解决方案,使用每个站点的单个吞吐量和整体网络能耗的分析性能模型来搜索和找到站点和接入点之间关联的有效映射。使用两个实际的异构网络办公室部署,我们评估了我们的解决方案在发现比基线策略更好的权衡方面的有效性。我们的数值结果表明,在站的吞吐量和总体能耗方面可以获得显着的收益。
{"title":"Towards a Throughput and Energy Efficient Association Strategy for Wi-Fi/LiFi Heterogeneous Networks","authors":"Esther Guérin, Thomas Begin, A. Busson, I. G. Lassous","doi":"10.1145/3479240.3488514","DOIUrl":"https://doi.org/10.1145/3479240.3488514","url":null,"abstract":"In very dense or ultra-dense scenarios wherein Wi-Fi alone may not be enough to accommodate the needs of all stations, LiFi (Light Fidelity) access points can help alleviate the strain on the Wi-Fi by offloading some Wi-Fi traffic to LiFi. We study the issue of associating stations in a Wi-Fi/LiFi heterogeneous network composed of a Wi-Fi access point and multiples LiFi access points. We propose a conceptually simple and easy to implement solution to search and find an efficient mapping for the associations between stations and access points using analytical performance models for the individual throughput of each station and for the overall network energy consumption. Using two realistic deployments of heterogeneous networks for offices, we have evaluated the effectiveness of our solution at discovering better trade-offs than baseline strategies. Our numerical results show that significant gains can be obtained in terms of the throughput of the stations as well as overall energy consumption.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":"8 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91349970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Social Mix-zones: Anonymizing Personal Information on Contact Tracing Data 社交混合区域:匿名化联系人追踪数据中的个人信息
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-11-22 DOI: 10.1145/3479240.3488533
A. C. Domingues, Ekler Paulino de Mattos, Fabrício A. Silva, Heitor S. Ramos, A. Loureiro
In many different contexts, the encounter between two or more individuals opens a window in which information can be exchanged. Considering Mobile Ad hoc Networks (MANETs) scenarios, encounters - also called contacts - are used to transfer data between nodes (the users). In more recent cases, tracing contacts between individuals has shown to be a strong strategy in mapping the transmission of contagious diseases, such as COVID-19. However, sharing contact data can impose threats to the safety of participants regarding their social and mobility behavior. As an example, we can infer acquaintances, as well as home and work locations. This work presents a strategy to anonymize contact tracing data by utilizing mix-zones, a well-defined concept to anonymize data in a given region. Called social mix-zones, it considers the number of contacts happening in a location, producing anonymized data and protecting the personal integrity of the individuals. We validate the proposal using two real contact tracing data, showing that social mix-zones can cover a large portion of contacts, reducing the risk of malicious location attacks.
在许多不同的情况下,两个或两个以上的人之间的相遇打开了一扇可以交换信息的窗口。考虑到移动自组织网络(manet)场景,接触(也称为接触)用于在节点(用户)之间传输数据。在最近的病例中,追踪个体之间的接触已被证明是绘制COVID-19等传染病传播地图的有力策略。然而,共享联系人数据可能会对参与者的社交和移动行为的安全构成威胁。例如,我们可以推断出熟人,以及家庭和工作地点。这项工作提出了一种策略,利用混合区域匿名化接触追踪数据,混合区域是一个定义良好的概念,用于匿名化给定区域的数据。它被称为社交混合区,考虑在一个地点发生的接触数量,产生匿名数据并保护个人的个人完整性。我们使用两个真实的联系人跟踪数据验证了该建议,表明社交混合区域可以覆盖大部分联系人,从而降低恶意位置攻击的风险。
{"title":"Social Mix-zones: Anonymizing Personal Information on Contact Tracing Data","authors":"A. C. Domingues, Ekler Paulino de Mattos, Fabrício A. Silva, Heitor S. Ramos, A. Loureiro","doi":"10.1145/3479240.3488533","DOIUrl":"https://doi.org/10.1145/3479240.3488533","url":null,"abstract":"In many different contexts, the encounter between two or more individuals opens a window in which information can be exchanged. Considering Mobile Ad hoc Networks (MANETs) scenarios, encounters - also called contacts - are used to transfer data between nodes (the users). In more recent cases, tracing contacts between individuals has shown to be a strong strategy in mapping the transmission of contagious diseases, such as COVID-19. However, sharing contact data can impose threats to the safety of participants regarding their social and mobility behavior. As an example, we can infer acquaintances, as well as home and work locations. This work presents a strategy to anonymize contact tracing data by utilizing mix-zones, a well-defined concept to anonymize data in a given region. Called social mix-zones, it considers the number of contacts happening in a location, producing anonymized data and protecting the personal integrity of the individuals. We validate the proposal using two real contact tracing data, showing that social mix-zones can cover a large portion of contacts, reducing the risk of malicious location attacks.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":"141 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77301414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Providing Internet Access for Post-Disaster Communications using Balloon Networks 利用气球网络为灾后通讯提供互联网接入服务
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-11-22 DOI: 10.1145/3479240.3488497
Perumalraja Rengaraju, K. Sethuramalingam, Chung-Horng Lung
Natural disasters such as earthquake, tsunami, land sliding, wildfires, flood and hurricane have frequently happened in many places around the world. Once disaster occurred, communication networks and information systems may be damaged, depending on the level of destruction. When communication networks are seriously affected, residents in the disaster area cannot communicate their situations and needs. In recent years, social networks play a vital role in connecting people and providing support with woe for survivors and their family during natural catastrophes around the world. Therefore, it is necessary to provide Internet services to the affected area at the earliest, so that victims can use the emergency communication network to confirm their safety. From the literature study, it was observed that the balloon networks satisfy the needs of post disaster communications. In this paper, a prototype system for a balloon network is constructed using two wireless nodes in the sky for establishing emergency communications. The Internet service is provided for the network using WiFi and tested for disaster communications, e.g., accessing social network sites and VoIP calls. Finally, we evaluate the performance of the disaster communications to analyze the suitability of balloon networks during post disaster communications. From the results it is observed that a WiFi balloon network can be deployed easily to provide Internet services to the affected area to meet users' needs.
地震、海啸、滑坡、山火、洪水、飓风等自然灾害在世界许多地方频繁发生。一旦发生灾害,通信网络和信息系统可能会受到破坏,这取决于破坏的程度。当通信网络受到严重影响时,灾区居民无法沟通他们的情况和需求。近年来,在世界各地的自然灾害中,社交网络在联系人们和为幸存者及其家人提供支持方面发挥着至关重要的作用。因此,有必要尽早向受灾地区提供互联网服务,使受害者能够利用应急通信网络确认自己的安全。从文献研究中可以看出,气球网满足灾后通信的需要。本文利用空中的两个无线节点构建了气球网络的原型系统,用于建立应急通信。使用WiFi为网络提供互联网服务,并对灾难通信进行测试,例如访问社交网站和VoIP呼叫。最后,我们评估了灾害通信的性能,以分析气球网络在灾后通信中的适用性。从结果可以看出,可以很容易地部署WiFi气球网络,为受灾地区提供互联网服务,满足用户需求。
{"title":"Providing Internet Access for Post-Disaster Communications using Balloon Networks","authors":"Perumalraja Rengaraju, K. Sethuramalingam, Chung-Horng Lung","doi":"10.1145/3479240.3488497","DOIUrl":"https://doi.org/10.1145/3479240.3488497","url":null,"abstract":"Natural disasters such as earthquake, tsunami, land sliding, wildfires, flood and hurricane have frequently happened in many places around the world. Once disaster occurred, communication networks and information systems may be damaged, depending on the level of destruction. When communication networks are seriously affected, residents in the disaster area cannot communicate their situations and needs. In recent years, social networks play a vital role in connecting people and providing support with woe for survivors and their family during natural catastrophes around the world. Therefore, it is necessary to provide Internet services to the affected area at the earliest, so that victims can use the emergency communication network to confirm their safety. From the literature study, it was observed that the balloon networks satisfy the needs of post disaster communications. In this paper, a prototype system for a balloon network is constructed using two wireless nodes in the sky for establishing emergency communications. The Internet service is provided for the network using WiFi and tested for disaster communications, e.g., accessing social network sites and VoIP calls. Finally, we evaluate the performance of the disaster communications to analyze the suitability of balloon networks during post disaster communications. From the results it is observed that a WiFi balloon network can be deployed easily to provide Internet services to the affected area to meet users' needs.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":"1 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85244192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A PUF-based Authentication Mechanism for OSCORE 基于puf的OSCORE认证机制
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-11-22 DOI: 10.1145/3479240.3488526
J. Díaz, Florina Almenáres
Within environment generated when deploying Internet of Things (IoT) solutions, there is a need to do it securely. Authentication of the devices against the applications deployed on the servers, which receive or send data to the IoT devices must be carried out. Standard IoT protocols, such as CoAP or MQTT, define secure communica- tions through protocols on transport, network or application layers. Nevertheless, a shortcoming when protocols using secret keys are used lies in the management of such keys, which is out of scope of the specifications. For this reason, this article presents an authenti- cation solution for OSCORE (Object Security for Constrained RESTful Environments) based on PUFs (Physical Unclonable Functions) that makes it possible to establish a secure mechanism for the exchange and management of keys. The performance of this proposal has been evaluated, showing its viability.
在部署物联网(IoT)解决方案时生成的环境中,需要安全地进行。设备必须针对部署在服务器上的应用程序进行身份验证,这些服务器负责向物联网设备接收或发送数据。标准的物联网协议,如CoAP或MQTT,通过传输层、网络层或应用层的协议定义安全通信。然而,当使用使用秘密密钥的协议时,缺点在于对这些密钥的管理,这超出了规范的范围。为此,本文提出了一种基于puf(物理不可克隆函数)的OSCORE(受约束RESTful环境的对象安全)身份验证解决方案,该解决方案可以建立密钥交换和管理的安全机制。对该建议的执行情况进行了评价,表明其可行性。
{"title":"A PUF-based Authentication Mechanism for OSCORE","authors":"J. Díaz, Florina Almenáres","doi":"10.1145/3479240.3488526","DOIUrl":"https://doi.org/10.1145/3479240.3488526","url":null,"abstract":"Within environment generated when deploying Internet of Things (IoT) solutions, there is a need to do it securely. Authentication of the devices against the applications deployed on the servers, which receive or send data to the IoT devices must be carried out. Standard IoT protocols, such as CoAP or MQTT, define secure communica- tions through protocols on transport, network or application layers. Nevertheless, a shortcoming when protocols using secret keys are used lies in the management of such keys, which is out of scope of the specifications. For this reason, this article presents an authenti- cation solution for OSCORE (Object Security for Constrained RESTful Environments) based on PUFs (Physical Unclonable Functions) that makes it possible to establish a secure mechanism for the exchange and management of keys. The performance of this proposal has been evaluated, showing its viability.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":"12 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79613206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Session 1: Vehicular Networks 会议详情:会议1:车辆网络
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-11-22 DOI: 10.1145/3501370
M. Aguilar Igartua
{"title":"Session details: Session 1: Vehicular Networks","authors":"M. Aguilar Igartua","doi":"10.1145/3501370","DOIUrl":"https://doi.org/10.1145/3501370","url":null,"abstract":"","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":"40 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80519374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Session details: Session 4: Enhancement of Wireless Ad hoc Networks 会议详情:会议4:无线自组织网络的增强
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-11-22 DOI: 10.1145/3501373
I. Guérin Lassous
{"title":"Session details: Session 4: Enhancement of Wireless Ad hoc Networks","authors":"I. Guérin Lassous","doi":"10.1145/3501373","DOIUrl":"https://doi.org/10.1145/3501373","url":null,"abstract":"","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":"163 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77647930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving the Realism of the Physical Layer of NS-3 by Considering the PAPR Problem of the IEEE 802.11p Transmitter 考虑IEEE 802.11p发射机的PAPR问题提高NS-3物理层的真实感
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-11-22 DOI: 10.1145/3479240.3488509
Diego Javier Reinoso Chisaguano, J. León, M. C. Paredes, Pablo Anibal Lupera Morillo, L. Urquiza-Aguiar
NS-3 is a network simulator used for the research and development of Vehicular Ad-hoc Networks (VANETs). It allows the IEEE 802.11p standard simulation, which is part of IEEE Wireless Access in the Vehicular Environment (WAVE). One of the limitations of the 802.11p standard in NS-3 is using a simplified theoretical model of the Packet Error Rate (PER). This standard uses for the Physical Layer (PHY) the Orthogonal Frequency Division Multiplexing (OFDM) technique, which suffers from high Peak to Average Power Ratio (PAPR). This high PAPR of the signal causes degradation of the PER when it passes through a non-linear amplifier. In this work, we study the effect of the high PAPR over the PER using a MATLAB implementation of the 802.11p PHY. We also analyze the effect of using the Orthogonal Pilot Sequences (OPS) technique for PAPR reduction. The results show that the high PAPR affects the PER of high data rates, which use 16-QAM and 64-QAM modulation. Finally, these results are extended to NS-3 simulations as a new model of the IEEE 802.11p PHY with high realism since it considers the effect of the non-linear HPA. The NS-3 results show a similar trend compared to the MATLAB simulations.
NS-3是一个用于研究和开发车辆自组织网络(VANETs)的网络模拟器。它允许IEEE 802.11p标准模拟,这是IEEE车载环境无线接入(WAVE)的一部分。NS-3中802.11p标准的限制之一是使用了简化的分组错误率(PER)理论模型。该标准在物理层(PHY)中使用正交频分复用(OFDM)技术,该技术的峰值与平均功率比(PAPR)较高。当信号通过非线性放大器时,高PAPR会导致PER的退化。在这项工作中,我们使用MATLAB实现802.11p PHY来研究高PAPR对PER的影响。我们还分析了使用正交导频序列(OPS)技术降低PAPR的效果。结果表明,高PAPR会影响采用16-QAM和64-QAM调制的高数据速率下的PER。最后,将这些结果扩展到NS-3仿真中,作为IEEE 802.11p物理层的新模型,由于考虑了非线性HPA的影响,具有较高的真实感。NS-3仿真结果与MATLAB仿真结果具有相似的趋势。
{"title":"Improving the Realism of the Physical Layer of NS-3 by Considering the PAPR Problem of the IEEE 802.11p Transmitter","authors":"Diego Javier Reinoso Chisaguano, J. León, M. C. Paredes, Pablo Anibal Lupera Morillo, L. Urquiza-Aguiar","doi":"10.1145/3479240.3488509","DOIUrl":"https://doi.org/10.1145/3479240.3488509","url":null,"abstract":"NS-3 is a network simulator used for the research and development of Vehicular Ad-hoc Networks (VANETs). It allows the IEEE 802.11p standard simulation, which is part of IEEE Wireless Access in the Vehicular Environment (WAVE). One of the limitations of the 802.11p standard in NS-3 is using a simplified theoretical model of the Packet Error Rate (PER). This standard uses for the Physical Layer (PHY) the Orthogonal Frequency Division Multiplexing (OFDM) technique, which suffers from high Peak to Average Power Ratio (PAPR). This high PAPR of the signal causes degradation of the PER when it passes through a non-linear amplifier. In this work, we study the effect of the high PAPR over the PER using a MATLAB implementation of the 802.11p PHY. We also analyze the effect of using the Orthogonal Pilot Sequences (OPS) technique for PAPR reduction. The results show that the high PAPR affects the PER of high data rates, which use 16-QAM and 64-QAM modulation. Finally, these results are extended to NS-3 simulations as a new model of the IEEE 802.11p PHY with high realism since it considers the effect of the non-linear HPA. The NS-3 results show a similar trend compared to the MATLAB simulations.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":"16 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77930242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Performance Evaluation in Misbehaviour Detection Techniques for DoS Attacks in VANETs VANETs中DoS攻击错误行为检测技术的性能评价
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-11-22 DOI: 10.1145/3479240.3488510
Mauro Clavijo-Herrera, J. Banda-Almeida, Cristhian Iza
Vehicular Ad Hoc Network (VANET) provides communication between vehicles and roadside infrastructures to improve safety, traffic efficiency, and comfort. VANET requires the implementation of precise security mechanisms to guarantee safety because attackers are always searching for methods to exploit network vulnerabilities. A common and harmful threat is the Denial of Service (DoS) attack. DOS is performed by malicious nodes to block vehicle communications and to interrupt network availability. In this work, we evaluate three different misbehavior detection mechanisms: threshold, behavioral, and cooperative. These methods are compared using the F2MD simulation environment with four DoS attacks: Normal, Random, Sybil, and DDoS. The performance of the misbehavior detection mechanisms is evaluated by accuracy, recall, and precision. Our comparative results demonstrate that the threshold-based method outperforms the other two in the proposed simulation scenario.
车辆自组织网络(VANET)提供车辆与路边基础设施之间的通信,以提高安全性、交通效率和舒适度。VANET需要精确的安全机制来保证安全,因为攻击者总是在寻找利用网络漏洞的方法。一种常见且有害的威胁是拒绝服务(DoS)攻击。DOS由恶意节点执行,以阻止车辆通信并中断网络可用性。在这项工作中,我们评估了三种不同的不当行为检测机制:阈值,行为和合作。通过F2MD仿真环境,将这些方法与四种DoS攻击(Normal、Random、Sybil和DDoS)进行了比较。不当行为检测机制的性能通过准确性、召回率和精确度来评估。我们的比较结果表明,基于阈值的方法在所提出的模拟场景中优于其他两种方法。
{"title":"Performance Evaluation in Misbehaviour Detection Techniques for DoS Attacks in VANETs","authors":"Mauro Clavijo-Herrera, J. Banda-Almeida, Cristhian Iza","doi":"10.1145/3479240.3488510","DOIUrl":"https://doi.org/10.1145/3479240.3488510","url":null,"abstract":"Vehicular Ad Hoc Network (VANET) provides communication between vehicles and roadside infrastructures to improve safety, traffic efficiency, and comfort. VANET requires the implementation of precise security mechanisms to guarantee safety because attackers are always searching for methods to exploit network vulnerabilities. A common and harmful threat is the Denial of Service (DoS) attack. DOS is performed by malicious nodes to block vehicle communications and to interrupt network availability. In this work, we evaluate three different misbehavior detection mechanisms: threshold, behavioral, and cooperative. These methods are compared using the F2MD simulation environment with four DoS attacks: Normal, Random, Sybil, and DDoS. The performance of the misbehavior detection mechanisms is evaluated by accuracy, recall, and precision. Our comparative results demonstrate that the threshold-based method outperforms the other two in the proposed simulation scenario.","PeriodicalId":55557,"journal":{"name":"Ad Hoc & Sensor Wireless Networks","volume":"38 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2021-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85611121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Ad Hoc & Sensor Wireless Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1